Fake sites spreading malware claim Obama won't take oath Sites claiming President-Elect Barack Obama will refuse to take the oath of office Tuesday are serving up attack code believed to be programmed by the same hackers responsible for the notorious Storm bot Trojan, researchers said this weekend. 'Amazing' worm attack infects 9 million PCs Calling the scope of the attack "amazing," security researchers at F-Secure Corp. Friday said that 6.5 million Windows PCs have been infected by the "Downadup" worm in the last four days, and that nearly nine million have been compromised in just over two weeks. Likely insider hack taunts company executives At the same time the Radio Advertising Bureau (RAB) was making a 10% employee layoff yesterday, the association's CEO e-mail was hacked and a hoax lay-off memo sent out that disparaged the organization as sexist and filled with overpaid "good 'ol boys." Secure Software: 'See No Evil' is Not a Strategy It has been written that data is the new gold, the new oil, the new currency, and even the new crown jewels. It has become very popular to write about, and to capitalize upon, data as the new medium through which commerce is done. Unfortunately, while gold is typically transported in high security vehicles between highly secured facilities, and while no expense is spared in protecting national money supplies from theft and forgery, data is not managed this way, it is handled by software. This is software written twenty years ago for mainframes in sealed rooms, or software written by brilliant but unseen open source programmers to provide low-cost high-grade functionality, or software written by individuals with little formal secure programming training, looking to improve user experience and corporate profitability. Every major organization, enterprise, and government in the world relies on software, and there is virtually no consensus on what it means to have secure software, how to... U.K. Ministry of Defence stung by rapidly spreading virus The U.K. Ministry of Defence is in the midst of an electronic fight with a computer virus that rapidly spread through its computer networks starting Jan. 6. Study blasted for downplaying online threats to children A report released Wednesday by a task force set up by MySpace Inc. paints a surprisingly benign picture of the online security and privacy threats faced by children. But the report's conclusion - that some of the ... January giveaways from Cisco Subnet and Microsoft Subnet Up for grabs: Two Cisco training courses from Skyline-ATS worth up to $6,990, a Microsoft training course from New Horizons worth up to $2,500, 15 copies each of the hot book titles Microsoft SQL Server 2008 Management and Administration, IPv6 Security and Chained Exploits: Advanced Hacking Attacks. Get all the entry details here. |
No comments:
Post a Comment